General
-
Target
3a1b3746d26413c8668fb533ab612284.bin
-
Size
415KB
-
Sample
240517-bqsl8sah83
-
MD5
c8f0fb616fa223b27b0c357278bc4219
-
SHA1
8412ee56535209be5543a7bcca812b41b45b45d0
-
SHA256
b240b2832512dd4f637614b11be2d7dab70752d1b0b64c9bd5af76b6bb13979d
-
SHA512
b15cc4688b2cc4454c7d5023a845277e90b8364eb19bc5b059b86a3c700eb5558f27c5e95601a8e200a637e5030156762ef113f89006472f0b76bdca7de2f559
-
SSDEEP
12288:DjQoacQwh7X9aIFb690aJnothg0pxFodrWHv0v9Q8Wf:/OwhNZ690aECubodry0FQ8W
Behavioral task
behavioral1
Sample
0d57ce22e6ce4c0c232e21fbfab3ebde73d0a2f0f210602ece8d066d37e57924.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0d57ce22e6ce4c0c232e21fbfab3ebde73d0a2f0f210602ece8d066d37e57924.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
0d57ce22e6ce4c0c232e21fbfab3ebde73d0a2f0f210602ece8d066d37e57924.exe
-
Size
827KB
-
MD5
3a1b3746d26413c8668fb533ab612284
-
SHA1
875d159c892558473519f947c0421672717f7e2c
-
SHA256
0d57ce22e6ce4c0c232e21fbfab3ebde73d0a2f0f210602ece8d066d37e57924
-
SHA512
26f20ae889e6a327d6cd710082c0a2ccf4e94a6cc90bd8b3916f7b28a00e7f7c23448c7dfc817242b48e80468779b815133db64a7a4b7b77dc8729a940e5a8fe
-
SSDEEP
12288:DqUgxxQIWHTZu9PBjhP/i4TuI+sqBcDOC6hThC/8bMCHZR:uZQ9HTZu9lN/i4qI+sq6+nNj
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-